Sciweavers

579 search results - page 80 / 116
» Secure Access to Medical Data over the Internet
Sort
View
CCS
2006
ACM
15 years 5 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
JNW
2007
128views more  JNW 2007»
15 years 1 months ago
Store and Forward Applications in Telemedicine for Wireless IP Based Networks
— Telemedicine is the use of telecommunications technology to provide medical information and services. It may be as simple as two health professionals discussing a case over the...
Poondi Srinivasan Pandian, Kadavath Peedikayil Saf...
ICCSA
2010
Springer
15 years 8 months ago
Personalization of Search Profile Using Ant Foraging Approach
This paper proposes a three-stage analysis of web navigation that yields search results being relevant to the user’s interests and preferences. The approach is inspired by ant fo...
Pattira Phinitkar, Peraphon Sophatsathit
PET
2010
Springer
15 years 5 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
WWW
2008
ACM
16 years 2 months ago
User behavior oriented web spam detection
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru